Privacy

Related Projects

Related Topics

Privacy has become one of the defining issue of the Information Age. CIS has received national recognition for its interdisciplinary and multi-angle examination of privacy, particularly as it relates to emerging technology.

Aleecia M. McDonald's research focuses on the public policy issues of Internet privacy, and includes user expectations for Do Not Track, behavioral economics and mental models of privacy, and the efficacy of industry self regulation. She co-chaired, and remains active in, the WC3’s Tracking Protection Working Group, an ongoing effort to establish international standards for a Do Not Track mechanism that users can enable to request enhanced privacy online. Read more » about Aleecia McDonald

Jennifer Granick is the Director of Civil Liberties at the Stanford Center for Internet and Society. Jennifer returns to Stanford after working with the internet boutique firm of Zwillgen PLLC. Before that, she was the Civil Liberties Director at the Electronic Frontier Foundation. Jennifer practices, speaks and writes about computer crime and security, electronic surveillance, consumer privacy, data protection, copyright, trademark and the Digital Millennium Copyright Act. Read more » about Jennifer Granick

Ryan Calo is an assistant professor at the University of Washington School of Law and a former research director at CIS. A nationally recognized expert in law and emerging technology, Ryan's work has appeared in the New York Times, the Wall Street Journal, NPR, Wired Magazine, and other news outlets. Ryan serves on several advisory committees, including the Electronic Frontier Foundation, the Electronic Privacy Information Center, and the Future of Privacy Forum. Read more » about Ryan Calo

Jonathan Mayer is a Ph.D. candidate in computer science at Stanford University, where he received his J.D. in 2013. He was named one of the Forbes 30 Under 30 in 2014, for his work on technology security and privacy. Jonathan's research and commentary frequently appears in national publications, and he has contributed to federal and state law enforcement actions. Read more » about Jonathan Mayer

Yesterday, news emerged (or was officially leaked) that the President will announce an initiative designed to bolster American Internet security: the Cyber Threat Intelligence Integration Center. Based on the post-9/11 designed National Counterterrorism Center (CTC), this new organization purportedly will serve as an 'intelligence fusion center' within the Office of the Director of National Intelligence and work with the private sector in developing and sharing information and analysis related Internet security threats, vulnerabilities, trends, and situational awareness. Read more » about Information sharing to the cyber-rescue, again!

A recent Wall Street Journalarticle revealed an ongoing DEA program designed to use automated license plate readers to build a real-time database of vehicle movement throughout the United States. This database would also store this data, giving government agencies the ability to retroactively track the movements of millions of Americans. As we've seen with similar programs, the scope of the effort will inevitably begin to creep. Read more » about When Algorithmic Surveillance Becomes Structural Surveillance

Among the 400 gigabytes of internal documents belonging to surveillance firm Hacking Team that were released online this week are details of the company's dealings with some of the most oppressive governments in the world. The revelations, which have generated alarm among privacy, security, and human rights advocates, have also fueled debate around the esoteric but important topic of government controls on the export of powerful software that can secretly infiltrate and seize control of targeted computers.

Most Internet users are familiar with trolling—aggressive, foul-mouthed posts designed to elicit angry responses in a site’s comments. Less familiar but far more serious is the way some use networked technologies to target real people, subjecting them, by name and address, to vicious, often terrifying, online abuse. In an in-depth investigation of a problem that is too often trivialized by lawmakers and the media, Danielle Keats Citron exposes the startling extent of personal cyber-attacks and proposes practical, lawful ways to prevent and punish online harassment. Read more » about Hate Crimes in Cyberspace

Pages

On this week's show we'll be checking in with Richard Forno on the fallout from the OPM breach. Richard has been kicking around in DC infosec circles for a long time now and he let's us know what the mood is like inside the beltway.

"WELNA: It could indeed. Hackers, by definition, are trying to break into other people's computer accounts and steal their information, so monitoring their activity means watching them poach on other people's Internet usage and private data. I talked with Jonathan Mayer, a computer security fellow at Stanford who's reviewed these latest Snowden documents. He says because of the way the surveillance law is written, the NSA can actually hang on to that hacked information.Read more » about New Snowden Documents Reveal Government Collection Of Online Data